SEARCH

In digital business, the level of security is highly dependent on applying due care and diligence and on the storage media on which the digital certificate holder stores their private key. At the moment, the highest security is provided by smart cards / USB…

The Certification Authority (CA) plays the central role in the public key infrastructure. It represents an institution that enjoys the trust of all users of digital certificates and signatures. The CA receives requests for issuing digital certificates, performs…

Smart cards / USB keys are at the moment the most secure technology for storing qualified digital certificates. A smart card / USB key is a “small computer” designed using cryptographic circuitry. The private key is safely stored on the card / USB key…

Each qualified certificate holder has a pair of keys, the private and the public key. The private key allows the generation of a digital signature that is unique to each holder, while the public key is available to anyone. A document is digitally signed using…

In electronic business, the system for using the security methods based on asymmetric cryptography is called the Public Key Infrastructure (PKI). The PKI is determined by procedures and equipment for: key generation and storage certifying key holders and…

The level of security depends on the storage media on which the digital certificate holder stores their private key. At the moment, the highest security is provided by smart cards, whose main advantage is that the private key never leaves the card and the…

Throughout history, cryptography has been dealing with the problem of how to conceal a message from other groups of people. Cryptography or encryption is the process of converting readable text (plaintext) into unreadable text (ciphertext), which is very…

A digital signature basically serves as proof of the identity of the electronic document signer and ensures data integrity and protection against modifying the content of an e-document. Digital signatures are based on asymmetric cryptography, which is why…